Linux Security Testing Course Overview

Learn how to eliminate or mitigate security issues on Unix based operating systems, file systems or applications that run on Unix and Linux. You'll get practical guidance and configuration support with real world examples, techniques and tricks to manage security. The Securing Linux training program outlines a highly technical approach using a number of tools and techniques in an enterprise environment with Linux setup. Utilize tools such as AIDE, lsof, sudo, SSH for handling security issues.

One of the main concerns in business environments nowadays is to secure systems from unscrupulous intentions that may damage the integrity and privacy of critical business information. The Securing Linux course from Koenig Solutions will help professionals safeguard their Linux/Unix systems from threats and vulnerabilities. Securing Linux and Unix systems course offers a complete guide on mitigating security risks by providing visibility of possible security loopholes and attack vectors. So join this course if you want your Linux/Unix system to be in your control.

This is a Rare Course and it can be take up to 3 weeks to arrange the training.

  • 1. Do you have limited Window for training?
  • 2. Can you only spend 4-hours per day?
  • 3. Do you want to start training immediately?
  • If your answer is yes to any one of the above, you need 1-on-1- Training
The 1-on-1 Advantage
Methodology
Flexible Dates
4-Hour Sessions
  • View video
  • The course will be free if we are not able to start within 7 days of booking.
  • Only applicable for courses on which this logo appears.

Your will learn:

Module 1: Memory Attacks and Overflows
  • Stack and Heap Overflows
  • Format String Attacks
  • Stack Protection
  • Minimization vs. Patching
  • OS Minimization
  • Patching Strategies
  • Reducing Services
  • systemd vs init
  • Email Configuration
  • Legacy Services
  • Session Hijacking Exploits
  • The Argument For Encryption
  • SSH Configuration
  • IP Tables and Other Alternatives
  • Simple Single-Host Firewalls
  • Managing and Automating Rule Updates
  • Backdoors and Rootkits
  • Kernel Rootkits
  • chkrootkit and rkhunter
  • Overview of AIDE
  • Basic Configuration
  • Typical Usage
  • Known Attacks
  • Single User Mode Security
  • Boot Loader Passwords
  • Password Threats and Defenses
  • User Access Controls
  • Environment Settings
  • Features and Common Uses
  • Configuration
  • Known Issues and Work-Arounds
  • Why?
  • Suggested Content
  • Implementation Issues
  • Network Tuning
  • System Resource Limits
  • Restricting Core Files
  • Why and How
  • Public Key Authentication
  • ssh-agent and Agent Forwarding
  • Conceptual Overview
  • SSH Configuration
  • Tools and Scripts
  • Syslog Configuration
  • System Accounting
  • Process Accounting
  • Kernel-Level Auditing
  • X11 Forwarding
  • TCP Forwarding
  • Reverse Tunneling Issues
  • Why You Care
  • Basic Configuration
  • Hints and Hacks for Tunneling Log Data
  • Log Analysis Tools and Strategies
  • What is chroot()?
  • How Do You chroot()?
  • Known Security Issues
  • What It Is and How It Works
  • Configuring chroot() directory
  • Automounter Hacks for Large-Scale Deployments
  • Overview of Functionality
  • Navigation and Command Interface
  • Troubleshooting Common Issues
  • Tools and Prerequisites
  • Creating and Loading an Initial Policy
  • Testing and Refining Your Policy
  • Deploying Policy Files
  • Common Security Issues
  • Split-horizon DNS
  • Configuration for Security
  • Running BIND chroot()ed
  • Implementation Issues
  • Generating Keys and Signing Zones
  • Key "Rollover"
  • Automation Tools
  • Secure Directory Configuration
  • Configuration/Installation Choices
  • User Authentication
  • SSL Setup
  • Introduction to Common Configurations
  • Dependencies and Prerequisites
  • Core Rules
  • Installation and Debugging
  • The Sleuth Kit
  • Foremost
  • chkrootkit
  • lsof and Other Critical OS Commands
  • Basic Forensic Principles
  • Importance of Policy
  • Forensic Infrastructure
  • Building a Desktop Analysis Laboratory
  • Incident Response Process
  • Vital Investigation Tools
  • Taking a Live System Snapshot
  • Creating Bit Images
  • File System Basics
  • MAC Times and Timeline Analysis
  • Recovering Deleted Files
  • Searching Unallocated Space
  • String Searches
  • Critical Elements of a Report
  • Lessons Learned
  • Calculating Costs
Live Online Training (Duration : 32 Hours) Fee On Request
Group Training Date On Request
1-on-1 Training
4 Hours
8 Hours
Week Days
Weekend

Start Time : At any time

12 AM
12 PM

1-On-1 Training is Guaranteed to Run (GTR)
Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : On Request
Fee : On Request
On Request
Classroom Training is available. Enquire for the fee Click
Ultra-Fast Track

If you can't spare 32 hours. We can offer you an Ultra-Fast Track for 16 hours

Course Prerequisites
  • Before attending this course, students should have one year of experience managing Unix/Linux systems or have equivalent knowledge and skills
  • Good Understanding of TCP/IP is required

Upon Completion of this Course, you will accomplish following:-

  • Comprehend about Linux
  • Comprehend Network Attacks
  • Comprehend Logs and Integrity
  • Comprehend Securing Files and Directories
  • Comprehend Authorization Controls
  • Comprehend Firewall with IP table
  • Comprehend IDS and Honeypot
  • Comprehend Testing and Monitoring

Give an edge to your career with Cyber Security certification training courses. Students can join the classes for Linux Security Testing Training & Certification Course at Koenig Campus located at New Delhi, Bengaluru, Shimla, Goa, Dehradun, Dubai & Instructor-Led Online.

Request More Information

Add Name and Email Address of participant (If different from you)

FAQ's


No, the published fee includes all applicable taxes.
The Fee includes:
  • Courseware
  • Remote Labs
Yes, Koenig Solutions is a Open Source Learning Partner